msisip.pdb
Static task
static1
Behavioral task
behavioral1
Sample
56bf8fadc9daa0c651e81e1849c767f0_NeikiAnalytics.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
56bf8fadc9daa0c651e81e1849c767f0_NeikiAnalytics.exe
Resource
win10v2004-20240508-en
General
-
Target
56bf8fadc9daa0c651e81e1849c767f0_NeikiAnalytics
-
Size
283KB
-
MD5
56bf8fadc9daa0c651e81e1849c767f0
-
SHA1
c2999a889a1150cf9f10eb7ea7c2d287bbbeb93f
-
SHA256
c8d52e607695bb0646f240100ad12229f33e32e2c4b8456bf1c646fc2fbb45c3
-
SHA512
54c53fe9547e2563b6c84a850688603e4ba376b959ff0473a961c867e953f4172840bfffdeb6de0ca59ff3f68ebb0acc8f5a641ad7de50e056db79ee2afcda77
-
SSDEEP
3072:vGhmt5s87YULHWQLDRZ7ah3grM+P1Rpo+A8OQKZ7TwyXlfXGWghY2BeVaah3Zq7R:fxsUqkLmh31O1zo+4hwNYD1Avxwff
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56bf8fadc9daa0c651e81e1849c767f0_NeikiAnalytics
Files
-
56bf8fadc9daa0c651e81e1849c767f0_NeikiAnalytics.exe windows:5 windows x86 arch:x86
ed88141319f3ee98c5a779feab01f246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetVersionExW
GetComputerNameW
lstrcpyW
GetModuleHandleA
CopyFileW
GetModuleHandleW
DelayLoadFailureHook
RemoveDirectoryW
lstrcpynW
EnterCriticalSection
DisableThreadLibraryCalls
LoadLibraryA
GetWindowsDirectoryW
SetLastError
LocalFree
SetFileAttributesW
GetFileAttributesW
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryW
GetSystemDirectoryW
WritePrivateProfileStringW
ExpandEnvironmentStringsW
WaitForSingleObject
CloseHandle
WriteFile
CreateFileW
GetTempPathW
GetExitCodeProcess
WaitForMultipleObjects
CreateProcessW
FindClose
FindNextFileW
MoveFileW
FindFirstFileW
LoadLibraryExW
GetStartupInfoW
Sleep
InitializeCriticalSection
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
LeaveCriticalSection
HeapFree
lstrlenW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileW
SetFilePointer
WideCharToMultiByte
OutputDebugStringW
HeapAlloc
GetProcessHeap
advapi32
RegSetValueW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
CloseServiceHandle
GetLengthSid
OpenServiceW
OpenSCManagerW
QueryServiceStatus
PrivilegeCheck
LookupPrivilegeValueW
OpenThreadToken
OpenProcessToken
msvcrt
malloc
_write
_iob
fprintf
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__initenv
_cexit
_XcptFilter
_exit
_c_exit
strrchr
_close
_open
exit
gdi32
GetDeviceCaps
CreateFontIndirectW
DeleteObject
user32
ReleaseDC
GetDC
SetFocus
SetWindowTextW
SetForegroundWindow
SendDlgItemMessageW
GetDlgItemTextW
ScreenToClient
LoadStringW
SetDlgItemInt
FillRect
GetClientRect
GetSysColorBrush
DefWindowProcW
WinHelpW
LoadImageW
LoadCursorW
DispatchMessageW
DialogBoxParamW
MessageBoxW
CreateDialogParamW
GetDesktopWindow
MoveWindow
SetDlgItemTextW
ShowWindow
CharPrevW
CharNextW
IsDlgButtonChecked
GetWindowTextW
SendMessageW
GetDlgItem
EnableWindow
SetCursor
wsprintfW
IsWindow
BringWindowToTop
DestroyWindow
EndDialog
PeekMessageW
FindWindowW
UpdateWindow
GetWindowRect
GetSystemMetrics
SetWindowPos
GetParent
MsgWaitForMultipleObjects
GetWindowLongW
PostMessageW
SetWindowLongW
CheckDlgButton
RegisterWindowMessageW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 200KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ